54 resultados para Distributed computer-controlled systems


Relevância:

40.00% 40.00%

Publicador:

Resumo:

Space plasmas provide abundant evidence of highly energetic particle population, resulting in a long-tailed non-Maxwellian distribution. Furthermore, the first stages in the evolution of plasmas produced during laser-matter interaction are dominated by nonthermal electrons, as confirmed by experimental observation and computer simulations. This phenomenon is efficiently modelled via a kappa-type distribution. We present an overview, from first principles, of the effect of superthermality on the characteristics of electrostatic plasma waves. We rely on a fluid model for ion-acoustic excitations, employing a kappa distribution function to model excess superthermality of the electron distribution. Focusing on nonlinear excitations (solitons), in the form of solitary waves (pulses), shocks and envelope solitons, and employing standard methodological tools of nonlinear plasmadynamical analysis, we discuss the role of excess superthermality in their propagation dynamics (existence laws, stability profile), geometric characteristics and stability. Numerical simulations are employed to confirm theoretical predictions, namely in terms of the stability of electrostatic pulses, as well as the modulational stability profile of bright- and dark-type envelope solitons.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

It is often believed that both ionic liquids and surfactants generally behave as non-specific denaturants of proteins. In this paper, it is shown that amphiphilic ionic liquids bearing a long alkyl chain and a target molecule, where the target molecule is appended via a carboxylic ester functionality, can represent super-substrates that enable the catalytic activity of an enzyme, even at high concentrations in solution. Menthol has been chosen as the target molecule for slow and controlled fragrance delivery, and it was found that the rate of the menthol release can be controlled by the chemical structure of the ionic liquid. At a more fundamental level, this study offers an insight into the complex hydrophobic, electrostatic, and hydrogen bond interactions between the enzyme and substrate.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The scheduling problem in distributed data-intensive computing environments has become an active research topic due to the tremendous growth in grid and cloud computing environments. As an innovative distributed intelligent paradigm, swarm intelligence provides a novel approach to solving these potentially intractable problems. In this paper, we formulate the scheduling problem for work-flow applications with security constraints in distributed data-intensive computing environments and present a novel security constraint model. Several meta-heuristic adaptations to the particle swarm optimization algorithm are introduced to deal with the formulation of efficient schedules. A variable neighborhood particle swarm optimization algorithm is compared with a multi-start particle swarm optimization and multi-start genetic algorithm. Experimental results illustrate that population based meta-heuristics approaches usually provide a good balance between global exploration and local exploitation and their feasibility and effectiveness for scheduling work-flow applications. © 2010 Elsevier Inc. All rights reserved.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

We analyze ways by which people decompose into groups in distributed systems. We are interested in systems in which an agent can increase its utility by connecting to other agents, but must also pay a cost that increases with the size of the sys- tem. The right balance is achieved by the right size group of agents. We formulate and analyze three intuitive and realistic games and show how simple changes in the protocol can dras- tically improve the price of anarchy of these games. In partic- ular, we identify two important properties for a low price of anarchy: agreement in joining the system, and the possibil- ity of appealing a rejection from a system. We show that the latter property is especially important if there are some pre- existing constraints regarding who may collaborate (or com- municate) with whom.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Focusing on the uplink, where mobile users (each with a single transmit antenna) communicate with a base station with multiple antennas, we treat multiple users as antennas to enable spatial multiplexing across users. Introducing distributed closed-loop spatial multiplexing with threshold-based user selection, we propose two uplink channel-assigning strategies with limited feedback. We prove that the proposed system also outperforms the standard greedy scheme with respect to the degree of fairness, measured by the variance of the time averaged throughput. For uplink multi-antenna systems, we show that the proposed scheduling is a better choice than the greedy scheme in terms of the average BER, feedback complexity, and fairness. The numerical results corroborate our findings

Relevância:

40.00% 40.00%

Publicador:

Resumo:



We consider the problem of self-healing in peer-to-peer networks that are under repeated attack by an omniscient adversary. We assume that the following process continues for up to n rounds where n is the total number of nodes initially in the network: the adversary deletesan arbitrary node from the network, then the network responds by quickly adding a small number of new edges.

We present a distributed data structure that ensures two key properties. First, the diameter of the network is never more than O(log Delta) times its original diameter, where Delta is the maximum degree of the network initially. We note that for many peer-to-peer systems, Delta is polylogarithmic, so the diameter increase would be a O(loglog n) multiplicative factor. Second, the degree of any node never increases by more than 3 over its original degree. Our data structure is fully distributed, has O(1) latency per round and requires each node to send and receive O(1) messages per round. The data structure requires an initial setup phase that has latency equal to the diameter of the original network, and requires, with high probability, each node v to send O(log n) messages along every edge incident to v. Our approach is orthogonal and complementary to traditional topology-based approaches to defending against attack.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper presents a preliminary study of developing a novel distributed adaptive real-time learning framework for wide area monitoring of power systems integrated with distributed generations using synchrophasor technology. The framework comprises distributed agents (synchrophasors) for autonomous local condition monitoring and fault detection, and a central unit for generating global view for situation awareness and decision making. Key technologies that can be integrated into this hierarchical distributed learning scheme are discussed to enable real-time information extraction and knowledge discovery for decision making, without explicitly accumulating and storing all raw data by the central unit. Based on this, the configuration of a wide area monitoring system of power systems using synchrophasor technology, and the functionalities for locally installed open-phasor-measurement-units (OpenPMUs) and a central unit are presented. Initial results on anti-islanding protection using the proposed approach are given to illustrate the effectiveness.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

A framework supporting fast prototyping as well as tuning of distributed applications is presented. The approach is based on the adoption of a formal model that is used to describe the orchestration of distributed applications. The formal model (Orc by Misra and Cook) can be used to support semi-formal reasoning about the applications at hand. The paper describes how the framework can be used to derive and evaluate alternative orchestrations of a well know parallel/distributed computation pattern; and shows how the same formal model can be used to support generation of prototypes of distributed applications skeletons directly from the application description.